Lecture Notes in Computer Science

Results: 278



#Item
81Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 07:57:12
82

Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2015-09-04 19:44:09
    83

    A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ‘07, Lecture Notes in Computer Science Vol. 4833, pp. 147–163, K. Kurosawa ed., Springer-Verlag, 2007. This is the full version. How

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2009-09-29 10:16:48
      84

      123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: Computer

      Add to Reading List

      Source URL: esorics2014.pwr.wroc.pl

      Language: English - Date: 2016-02-02 07:15:05
        85

        Published In W. Meier and D. Mukhopadhyay, Eds., Progress in Cryptology − INDOCRYPT 2014, volof Lecture Notes in Computer Science, p. XXI, Springer, 2014. Recent Advances in ID-based Encryption (Invited Talk) Ma

        Add to Reading List

        Source URL: joye.site88.net

        - Date: 2015-09-04 19:43:52
          86

          Lecture Notes in Computer Science:

          Add to Reading List

          Source URL: ciir.cs.umass.edu

          Language: English - Date: 2012-01-12 09:54:45
            87

            An extended abstract of this paper appears in Kaoru Kurosawa, editor, Advances in Cryptology – ASIACRYPT 2007, volume ???? of Lecture Notes in Computer Science, Springer-Verlag, 2007 [ANPS07a]. This is the full version

            Add to Reading List

            Source URL: web.cecs.pdx.edu

            Language: English - Date: 2009-09-29 10:07:44
              88

              (C) Springer Verlag, Lecture Notes on Computer Science Algorithms for Enumerating All Perfect, Maximum and Maximal Matchings in Bipartite Graphs Takeaki UNO Department of Systems Science, Tokyo Institute of Technology,

              Add to Reading List

              Source URL: research.nii.ac.jp

              Language: English - Date: 2010-09-24 01:42:13
                89

                Lecture Notes in Computer Science: Authors’ Instructions for the Preparation

                Add to Reading List

                Source URL: www.idrbt.ac.in

                Language: English - Date: 2015-08-10 00:57:00
                  90

                  Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2009-08-09 19:41:15
                    UPDATE